1. National cyber leap year summit 2009 co-chairs report.
http://www.cyber.st.dhs.gov/docs/National_Cyber_Leap_Year_Summit_2009_Co-Chairs_Report.pdf
(2009)
2. Filar, J., Vrieze, K.: Competitive Markov decision processes. Springer (1997)
3. Lye, K., Wing, J.M.: Game strategies in network security. International Journal of Information Security pp. 71–86 (2005)
4. Lynch, N., Tuttle, M.: An introduction to input/output automata. CWI-Quarterly 2(3) (1989)
5. Manadhata, P.K.: An attack surface metric. Ph.D. thesis, Carnegie Mellon University (2008)